Analysis
-
max time kernel
397s -
max time network
363s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 11:35
Static task
static1
Behavioral task
behavioral1
Sample
oxhzulzwrt.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
oxhzulzwrt.exe
Resource
win10v2004-20240802-en
General
-
Target
oxhzulzwrt.exe
-
Size
137KB
-
MD5
a7c87a3414b9f40f48700c10391d5980
-
SHA1
97e195564d3b1b394e730d2cbe0369243c81149d
-
SHA256
b959398a698e3e7b4b18306724d9aa2d697956c6a160725f6d9a3a1c0699a1d4
-
SHA512
e4c3ae8a84679d8c05eacd160048bf98046fe25efab16e12c3759f1314f14930c8127a640af29ac0d85cd83e073775a384dfa474cc4d1cf5a3935229d506358e
-
SSDEEP
1536:0hYSOk+ac5boqXL6QozPIb/umpVvLX48JV0TdpHu4Eo5n1xesW+cd1GdxZbShX:06ZGQGgru+vLxJYnng1YxYX
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 oxhzulzwrt.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oxhzulzwrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Kills process with taskkill 1 IoCs
pid Process 2124 taskkill.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2720 reg.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2124 taskkill.exe Token: SeShutdownPrivilege 2584 oxhzulzwrt.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2232 2584 oxhzulzwrt.exe 31 PID 2584 wrote to memory of 2232 2584 oxhzulzwrt.exe 31 PID 2584 wrote to memory of 2232 2584 oxhzulzwrt.exe 31 PID 2584 wrote to memory of 2232 2584 oxhzulzwrt.exe 31 PID 2232 wrote to memory of 2124 2232 cmd.exe 33 PID 2232 wrote to memory of 2124 2232 cmd.exe 33 PID 2232 wrote to memory of 2124 2232 cmd.exe 33 PID 2232 wrote to memory of 2124 2232 cmd.exe 33 PID 2584 wrote to memory of 1152 2584 oxhzulzwrt.exe 35 PID 2584 wrote to memory of 1152 2584 oxhzulzwrt.exe 35 PID 2584 wrote to memory of 1152 2584 oxhzulzwrt.exe 35 PID 2584 wrote to memory of 1152 2584 oxhzulzwrt.exe 35 PID 1152 wrote to memory of 2720 1152 cmd.exe 37 PID 1152 wrote to memory of 2720 1152 cmd.exe 37 PID 1152 wrote to memory of 2720 1152 cmd.exe 37 PID 1152 wrote to memory of 2720 1152 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\oxhzulzwrt.exe"C:\Users\Admin\AppData\Local\Temp\oxhzulzwrt.exe"1⤵
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im taskmgr.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD hkcu\Software\Microsoft\Windows\CurrentVersion\policies\system /v DisableTaskMgr /t reg_dword /d 1 /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\reg.exeREG ADD hkcu\Software\Microsoft\Windows\CurrentVersion\policies\system /v DisableTaskMgr /t reg_dword /d 1 /f3⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2720
-
-